Advanced 5G Network Security Professional (ANSP)

Our courses are now available Online ‘Live’. We are committed to continue delivering high-quality training experience and ensure all participants can learn in an interactive, supportive, and encouraging environment. Email for more information.

Course Information

  • Duration: 5 Day / 40 Hours
  • Certification: Participants will receive a Certificate of Competency upon successfully completing the course and passing the examination
  • Who Should Attend: Cyber Security Specialist, Network Engineer, System Security, Software Engineer, Technologist, System Engineer, IT Professionals and Anyone seeking to acquire advanced knowledge on 5G Operation and Management

Course Objective

Advanced 5G Network Security Professional (ANSP) is designed for anyone interested in acquiring the advanced knowledge and technical know-how on 5G Network Security


It is recommended that participants attended and completed Advanced 5G Core Technologist (AFCT) or Cyber Security Attack / Defend Strategist (CSAD) prior to attending this course


Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to 5G Network Security based on the syllabus covered
Module 1 Introduction to 5G Network Security
Topics Covered
  • Introduction to 5G Network Security
  • Importance of 5G Network Security
  • Understanding the Evolution of Cellular Systems
  • Introduction to 1G Cellular Systems
  • Advanced Mobile Phone Service
  • Security in 1G
  • Security in 2G
  • Security in GSM
  • Security in 3G
  • Security in CDMA2000
  • Security in UMTS
  • Cellular Systems beyond 3G
  • Key Technologies of 4G
  • Beyond 3G and 4G Cellular Systems Security
  • LTE Security Model
  • Security in WiMAX

Module 2 Deep Dive into 5G Network and Technologies
Topics Covered
  • System Architecture in 5G
  • Spectrum in 5G
  • Benefits for User and Customer
  • High Data Rate and Ultra Low Latency
  • Massive Connectivity and Seamless Mobility
  • Reliability and High Availability
  • Flexibility and Programmability
  • Energy, Cost and Spectrum Efficiency
  • Security and Privacy

Module 3 Key Enabling Technologies in 5G
Topics Covered
  • 5G Radio Access Network
  • mmWave Communication
  • Massive MIMO
  • Ultra-Dense Small Cells
  • M2M and D2D Communications
  • Cloud-based Radio Access Network
  • Mobile Edge and Fog Computing
  • 5G Mobile Core Network
  • Software Defined Networking
  • Network Function Virtualization
  • Cloud Computing
  • G End-to-End System
  • Network Slicing
  • Management and Orchestration

Module 4 Standardization Activities in 5G
Topics Covered
  • ITU Activities
  • ITU-R
  • ITU-T
  • 3GPP Activities
  • Pre-5G Phase
  • 5G Phase I
  • 5G Phase II

Module 5 Understanding of Mobile Network Security Landscape
Topics Covered
  • Mobile Networks Security Landscape
  • Security Threats and Protection from 1G to 4G
  • LTE UE (User Equipment) Domain Security
  • LTE (Remote Access Network) Domain Security
  • LTE Core Network Domain Security
  • Security Threat Analysis for 4G
  • Security Threats and Protection for 5G
  • Next Generation Threat Landscape for 5G
  • IoT Threat Landscape
  • 5G Evolved Security Model
  • 5G Security Threat Analysis
  • Mobile Security Lifecycle Functions
  • Secure Device Management
  • Mobile OS and App Patch Management
  • Security Threat Analysis and Assessment
  • Security Monitoring

Module 6 Design Principles for 5G Security
Topics Covered
  • Overview on Security Recommendations
  • Security Threats and Recommendations
  • Other Security Challenges
  • Security Challenges in the Access Network
  • DoS Attacks
  • Security Challenges in the Control Layer or Core Network

Module 7 Core Technologies for 5G Security
Topics Covered
  • 5G Security Leveraging NFV
  • Network Security Leveraging SDN
  • Security Challenges in SDN
  • Application Layer
  • Controller Layer
  • Infrastructure Layer
  • Security Solutions for SDN
  • Application Plane Security
  • Control Plane Security
  • Data Plane Security Solutions

Module 8 Security in SDN-Based Mobile Networks
Topics Covered
  • Data Link Security
  • Control Channels Security
  • Traffic Monitoring
  • Access Control
  • Network Resilience
  • Security Systems and Firewalls
  • Network Security Automation

Module 9 Cyber Security Business Models in 5G
Topics Covered
  • Understanding the Cyber Security Businesses
  • Types of Cyber Threat
  • The Cost of Cyber-Attacks
  • The Business Model Approach
  • The 4C Typology of the ICT Business Model
  • Business Models in the Context of Cyber Preparedness
  • The Business Case of Cyber Security in the Era of 5G
  • The Users and Issues of Cyber Security in 5G
  • Scenarios for 5G Security Provisioning
  • Delivering Cyber Security in 5G
  • Business Model Options in 5G Cyber Security

Module 10 Physical Layer Security in 5G Network
Topics Covered
  • Introduction to Physical Layer Security in 5G Networks
  • WBPLSec System Model
  • Transmitter
  • Jamming Receiver
  • Secrecy Metrics
  • Secrecy Capacity of WBPLSec
  • Secrecy Capacity of iJAM
  • Outage Probability of Secrecy Capacity of a Jamming Receiver
  • Simulation Scenario for Secrecy Capacity
  • WBPLSec Applied to 5G networks

Module 11 Security for 5G-WLAN
Topics Covered
  • Introduction to WiFi-5G Networks Interoperability
  • WiFi (Wireless Local Area Network)
  • Interoperability of WiFi with 5G Networks
  • Overview of Network Architecture for WiFi-5G Networks Interoperability
  • MAC Layer
  • Network Layer
  • Transport Layer
  • Application Layer
  • 5G-WiFi Security Challenges
  • User and Device Identity Confidentiality
  • Integrity
  • Mutual Authentication and Key Management
  • Introduction to LiFi-5G Networks Interoperability
  • 5G-LiFi Security Challenges

Module 12 5G Network Physical Infrastructure
Topics Covered
  • Introduction to 5G Network Physical Infrastructure
  • Customer Edge Switching (CES) Framework
  • Deployment of CES into 5G Framework
  • Understanding Software Defined Security Monitoring in 5G Network
  • Software-Defined Monitoring Architecture
  • Pros and Cons of Software Defined Monitoring

Module 13 5G Network Security Framework
Topics Covered
  • Best Practices in Mobile Networks Security
  • Mobile Network Challenges and Principles of Security Framework
  • Trust Domains and Trust Processing
  • DNS to Initiate Communication
  • CETP Policy-based Communication
  • Policy Architecture
  • CES Security Mechanisms
  • Realm Gateway
  • RGW Security Mechanisms
  • Name Server Classification and Allocation Model
  • Preventing DNS Abuse
  • Bot-Detection Algorithm
  • TCP-Splice
  • Evaluation of CES Security
  • Evaluating the CETP Policy-based Communication
  • Security Testing
  • Outcomes of the Security Testing
  • Evaluation of RGW Security
  • Deployment in 5G Networks

Module 14 5G Positioning
Topics Covered
  • Outdoor vs Indoor Positioning Technologies
  • Passive vs Active Positioning
  • Overview of 5G Positioning Mechanisms
  • Security Threats in 5G Positioning
  • Security Threats Affecting LISP and LBSP
  • Security Threats Affecting the 5G User Device or LIC
  • Physical-Layer Based Security Enhancements Mechanisms
  • Reliability Monitoring and Outlier Detection Mechanisms
  • Detection, Location and Estimation of Interference Signals
  • Backup Systems
  • Enhancing Trustworthiness
  • Cryptographic Techniques for Security and Privacy of Positioning
  • Cryptographic Authentication in Positioning
  • Cryptographic Distance-Bounding
  • Privacy-Preserving Location-based Services

Module 15 Mobile Virtual Network Operators (MVNO)
Topics Covered
  • Cloudification of the Network Operators
  • MVNO Security
  • Data Security in TaaS
  • Hypervisor and VM Security in TaaS
  • SDN Security in TaaS
  • NFV Security in TaaS
  • OPNFV Security
  • Application Security in TaaS
  • MVNO Security Benchmark
  • TaaS Deployment Security
  • IaaS
  • PaaS
  • SaaS

Module 16 NFV and NFV-Based Security Services
Topics Covered
  • Introduction to NFV
  • NFV, SDN, and a Telco Cloud
  • Key NFV Drivers
  • Opportunity Cost and Competitive Landscape
  • Horizontal Network Slicing
  • Multi-Tenancy
  • Rapid Service Delivery
  • XaaS Models
  • Challenges and Opportunities of NFV Security
  • VNF Security Lifecycle and Trust
  • VNF Security in Operation
  • Multi-Tenancy and XaaS
  • NFV-based Network Security
  • Virtual Security Appliances
  • Distributed Network Security Services
  • Network Security as a Service
  • Policy-based Security Services
  • Machine Learning for NFV-based Security Services

Module 17 Cloud Computing in 5G
Topics Covered
  • Cloud Computing in 5G Networks
  • Cloud Computing Architecture
  • Cloud Deployment Models
  • Cloud Service Models
  • 5G Cloud Computing Architecture

Module 18 MEC in 5G Networks
Topics Covered
  • Introduction to MEC Computing
  • MEC in 5G
  • Understanding the Security Challenges in 5G Cloud
  • Virtualization Security
  • Cyber-Physical System (CPS) Security
  • Secure and Private Data Computation
  • Cloud Intrusion
  • Access Control
  • Security Challenges in 5G MEC
  • Denial of Service (DoS) Attack
  • Man-in-the-Middle (MitM)
  • Inconsistent Security Policies
  • VM Manipulation
  • Privacy Leakage
  • Security Architectures for 5G Cloud and MEC
  • Centralized Security Architectures
  • SDN-based Cloud Security Systems
  • 5GMEC, Cloud Security Research and Standardizations

Advanced 5G Network Security Professional (ANSP) involves rigorous usage of real-time case studies, role playing and group discussion

Certified Training Partner (CTP)